Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Воспользуйтесь формой поиска по сайту, чтобы подобрать полный список использованной литературы.
Если вы хотите выбрать для списка литературы книги определенного года издания, достаточно дописать его к поисковому запросу.

Результаты поиска

Поиск материалов

Лучшие результаты

  1. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.

Дополнительные результаты

  1. Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – М.: , 2012. – 445 с.
  2. Randall Englund and Alfonso Bucero. The Complete Project Manager: Integrating People, Organizational, and Technical Skills. – М.: , 2012. – 0 с.
  3. Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – М.: , 2012. – 195 с.
  4. Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  5. Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 419 с.
  6. Cryptography and Security: From Theory to Applications: Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 515 с.
  7. Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology). – М.: , 2012. – 283 с.
  8. Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – М.: , 2012. – 289 с.
  9. Manish Gupta. Threats, Countermeasures and Advances in Applied Information Security. – М.: , 2012. – 421 с.
  10. Danny Shiem-shin Then. Real Estate Asset Management: - Operational Property Assets and Facilities Support Services as a Business Resource. – М.: , 2012. – 408 с.
  11. Information Security Management Handbook, Sixth Edition, Volume 6. – М.: , 2012. – 504 с.
  12. Luis Lobo-Guerrero. Insuring Security: Biopolitics, security and risk. – М.: , 2012. – 178 с.
  13. Patricia OrdoA±ez de Pablos. Knowledge Management and Drivers of Innovation in Services Industries. – М.: , 2012. – 383 с.
  14. Terrorism and the Olympics: Major Event Security and Lessons for the Future. – М.: , 2012. – 272 с.
  15. Giorgio S. Questa. Fixed Income Analysis for the Global Financial Market: Money Market, Foreign Exchange, Securities, and Derivatives. – М.: Wiley, 1999. – 368 с.
  16. David G. Cotts, Edmond P. Rondeau. The Facility Manager's Guide to Finance and Budgeting. – М.: , 0. – 0 с.
  17. Douglas Hearth, Janis K. Zaima, Janis Zaima. Contemporary Investments: Security and Portfolio Analysis. – М.: , 0. – 0 с.
  18. Eileen Moore Trauth. The Culture of An Information Economy: Influences and Impacts in the Republic of Ireland. – М.: , 0. – 0 с.
  19. Gerald Kovacich. The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition. – М.: , 0. – 0 с.
  20. Willy McCourt, Derek Eldridge. Global Human Resource Management: Managing People in Developing and Transitional Countries. – М.: , 0. – 0 с.
  21. Lynda M Applegate, Robert D. Austin, F. Warren McFarlan, Lynda Applegate, Robert Austin, F. Warren McFarlan. Corporate Information Strategy and Management: Text and Cases. – М.: , 0. – 0 с.
  22. Bruce Klatt. The Ultimate Training Workshop Handbook: A Comprehensive Guide to Leading Successful Workshops and Training Programs. – М.: , 0. – 0 с.
  23. Joseph M. Firestone. Enterprise Information Portals and Knowledge Management. – М.: Butterworth-Heinemann, 2002. – 456 с.
  24. Rolf Wigand, Arnold Picot, Ralf Reichwald. Information, Organization and Management: Expanding Markets and Corporate Boundaries. – М.: , 0. – 0 с.
  25. Safe Schools: A Security and Loss Prevention Plan. – М.: , 0. – 0 с.
  26. Protecting Business Information : A Manager's Guide. – М.: , 0. – 0 с.
  27. Michael J. Earl, Oxford Institute of Information Management, Pa Consulting Group. Information Management: The Organizational Dimension. – М.: , 0. – 0 с.
  28. Mark B. Desman. Building an Information Security Awareness Program. – М.: , 0. – 0 с.
  29. Rebecca Herold. The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions. – М.: , 0. – 0 с.
  30. Jae K. Shim. Information Systems and Technology For The Non-Information Systems Executive: An Integrated Resource Management Guide fo. – М.: , 0. – 0 с.
  31. Mariagrazia Fugini, Carlo Bellettini. Information Security Policies and Actions in Modern Integrated Systems. – М.: , 0. – 0 с.
  32. John E. Murdock, Terry L. Crum. Common Sense on the Information Revolution and Your Job. – М.: , 0. – 0 с.
  33. Marko Nordquist. Towards Improved Security Management Practice: Designing an Organizational Model Procedure for the Implementation of Information Security Management in Heterogeneous Information Management. – М.: , 0. – 0 с.
  34. Steve Purser. A Practical Guide to Managing Information Security (Artech House Technology Management Library). – М.: , 0. – 0 с.
  35. Physical Security and the Inspection Process. – М.: , 0. – 0 с.
  36. Effective Security Management, Fourth Edition (Effective Security Management). – М.: , 0. – 0 с.
  37. Steven W. Floyd, Bill Wooldridge. The Strategic Middle Manager : How to Create and Sustain Competitive Advantage. – М.: , 0. – 0 с.
  38. Geoff Craighead. High-Rise Security and Fire Life Safety, Second Edition. – М.: , 0. – 0 с.
  39. Brian Detlor. Towards Knowledge Portals: From Human Issues to Intelligent Agents (Information Science and Knowledge Management, 19). – М.: , 0. – 0 с.
  40. Marian Quigley, Marian Quiqley. Information Security and Ethics: Social and Organizational Issues. – М.: , 0. – 0 с.
  41. Anup K. Ghosh. E-Commerce Security and Privacy. – М.: , 0. – 0 с.
  42. Harold F. Tipton, Micki Krause, Micki, Cissp Krause. Information Security Management Handbook, Fifth Edition. – М.: , 0. – 0 с.
  43. G. David Garson, G. David Information Technology and Computer Applications in Garson. Public Information Technology: Policy and Management Issues. – М.: , 0. – 0 с.
  44. Urs E. Gattiker. Information Security Dictionary: DEFINING THE TERMS DEFINE SECURITY FOR E-BUSINESS, INTERNET... (KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE). – М.: , 0. – 0 с.
  45. Guy Masterman. Strategic Sports Event Management : An international approach (Hospitality, Leisure and Tourism). – М.: , 2004. – 0 с.
  46. Business Process Change Management : ARIS in Practice. – М.: , 2003. – 0 с.
  47. Frank Bannister. Purchasing and Financial Management of Information Technology : A practical guide (Computer Weekly Professional). – М.: , 2003. – 0 с.
  48. Joseph White. False Alarm : Why the Greatest Threat to Social Security and Medicare Is the Campaign to "Save" Them (Century Foundation Book). – М.: , 2003. – 0 с.
  49. Managing Corporate Information Systems Evolution and Maintenance. – М.: , 2004. – 0 с.
  50. Economics of Information Security (Advances in Information Security). – М.: , 2004. – 0 с.
  51. Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – М.: , 2005. – 0 с.
  52. Information Security Management Handbook (Information Security Management Handbook). – М.: , 2004. – 0 с.
  53. Gary R. McClain, Deborah S. Romaine. The Everything Managing People Book: Quick And Easy Ways to Build, Motivate, And Nurture a First-rate Team (Everything: Business and Personal Finance). – М.: , 2007. – 320 с.
  54. Ira Winkler. Zen and the Art of Information Security. – М.: , 2007. – 192 с.
  55. Timothy P. Layton. Information Security. – М.: , 2006. – 222 с.
  56. Knowledge Management: Concepts, Methodologies, Tools and Applications (6-volume set). – М.: IGI Global, 2007. – 3420 с.
  57. Alan Calder, Steve Watkins. IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002. – М.: , 2008. – 384 с.
  58. Social and Human Elements of Information Security: Emerging Trends and Countermeasures (Premier Reference Source). – М.: , 2008. – 412 с.
  59. Selected Readings on Information Technology and Business Systems Management. – М.: , 2008. – 566 с.
  60. Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Lecture Notes in Computer Science). – М.: , 2008. – 534 с.
  61. Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, ... 2008 (Lecture Notes in Computer Science). – М.: , 2008. – 151 с.
  62. V.R. Leonard. The Social Security and Medicare Handbook: What You Need to Know Explained Simply. – М.: , 2008. – 288 с.
  63. Gerard Blokdijk, Ivanka Menken. Information Security Management Best Practice Workbook: Implementation and Management Roadmap for Threats, Challenges and Solutions - Ready to use supporting documents bringing Theory into Practice. – М.: , 2008. – 124 с.
  64. Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – М.: , 2009. – 414 с.
  65. Jeremy Hall PhD. Grant Management: Funding for Public and Nonprofit Programs. – М.: , 2009. – 225 с.
  66. W. Krag Brotby. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement. – М.: Auerbach Publications, 2009. – 200 с.
  67. Alan Calder. Information Security based on ISO 27001/ISO 27002: A Management Guide. – М.: , 2009. – 83 с.
  68. Jake Kouns, Daniel Minoli. Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. – М.: , 2010. – 421 с.
  69. Bel G. Raggad. Information Security Management: Concepts and Practice. – М.: , 2010. – 871 с.
  70. Michael E. Whitman, Herbert J. Mattord. Management of Information Security. – М.: , 2010. – 592 с.
  71. Alan Calder, Steve G Watkins. Information Security Risk Management for ISO27001 / ISO27002. – М.: , 2010. – 198 с.
  72. William Manning. CISM Certified Information Security Manager Certification Exam Preparation Course in a Book for Passing the CISM Exam - The How To Pass on Your First Try Certification Study Guide. – М.: , 2010. – 188 с.
  73. Levent Bayoglu. Management Information Systems And Data Warehousing: A Real Data Warehouse Retail Sample. – М.: , 2010. – 188 с.
  74. Frank Bannister. Purchasing and Financial Management of Information Technology. – М.: , 2010. – 384 с.
  75. Evan Wheeler. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. – М.: , 2011. – 360 с.
  76. The Emirates Center for Strategic Studies and Research. The Information Revolution and the Arab World: Its Impact on State and Society. – М.: I. B. Tauris, 1998. – 236 с.
  77. Information Security. Securing Intellectual Property. – М.: , 2010. – 288 с.
  78. Karen A. Schuler. E-discovery: Creating and Managing an Enterprisewide Program. – М.: , 2010. – 328 с.
  79. John R. Vacca. Computer and Information Security Handbook. – М.: , 2010. – 928 с.
  80. Sm Lynn–jones. Nuclear Diplomacy & Crisis Management – An International Security (Paper). – М.: , 1990. – 364 с.
  81. Sm Lynn–jones. Nuclear Diplomacy & Crisis Management – An International Security Reader. – М.: , 1990. – 364 с.
  82. Douglas W Blum. Russia and Globalization – Identity, Security and Society in an Era of Change. – М.: , 2008. – 402 с.
  83. Tim Mather. Cloud Security and Privacy. – М.: , 2009. – 334 с.
  84. Michael Miller. Absolute PC Security and Privacy. – М.: , 2002. – 560 с.
  85. Hm Schey. Div, Grad, Curl and All That – An Informal Text on Vector Calculus 4e. – М.: , 2005. – 0 с.
  86. Genserik L.L. Reniers. Multi–Plant Safety and Security Management in the Chemical and Process Industries. – М.: , 2010. – 290 с.
  87. Edited by Benjamin J Goold and Liora Lazarus. Security and Human Rights. – М.: , 2011. – 426 с.
  88. Helen Toner, Elspeth Guild and Anneliese Baldaccini. Whose Freedom, Security and Justice?. – М.: , 2011. – 582 с.
  89. Corporate Information Strategy And Management: Text And Cases. – М.: , 2009. – 0 с.
  90. Principles Of Computer Security, Comptia Security+ And Beyond, Second Edition. – М.: , 2011. – 0 с.
  91. Harold F. Tipton, Micki Krause. Information Security Management Handbook on CD-ROM, 2003 Edition. – М.: , . –  с.
  92. Carl Roper. Security Education, Awareness and Training. – М.: , 2010. – 400 с.
  93. ECSSR. Leadership and Management in Information Age. – М.: I. B. Tauris, 2014. –  с.
  94. Rohana Mohamad Rashid. Determining Influencing Factors of Information Security Culture. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  95. Manoj Kollam. A Low-cost Embedded Smart Car Security And Theft Control System. – М.: LAP Lambert Academic Publishing, 2011. – 84 с.
  96. Santu Kumar Jha and Arvind Kumar Tripathi. Plyometrics and Power Training Program. – М.: LAP Lambert Academic Publishing, 2014. – 64 с.
  97. Shukuru Nyagawa,Claude Mung'ong'o and Fanuel Shechambo. Information, Education and Communication (IEC)Strategy. – М.: LAP Lambert Academic Publishing, 2011. – 116 с.
  98. Lai Oso,Oludayo Soola and Umaru Pate. Media, Governance and Development in Nigeria:. – М.: LAP Lambert Academic Publishing, 2012. – 308 с.
  99. C. R. Prajapati,K. P. Singh and A. K. Gupta. Plant Disease Management for Food Security. – М.: LAP Lambert Academic Publishing, 2013. – 676 с.
  100. Navin Chandra Nainwal and Kanchan Nainwal. Post Harvest Management of Litchi for Marketing and Export. – М.: LAP Lambert Academic Publishing, 2014. – 120 с.
  101. MOHAMMED AL-AMIN. APPLICATION OF SPATIAL DATA IN FOREST ECOLOGY AND MANAGEMENT. – М.: LAP Lambert Academic Publishing, 2011. – 252 с.
  102. Amna Arif and Abdul Hameed. Psychologists Serving Persons with Special Needs. – М.: LAP Lambert Academic Publishing, 2013. – 176 с.
  103. Tereza Smejkalova. Common Security and Defense Policy from a Geopolitical Perspective. – М.: LAP Lambert Academic Publishing, 2013. – 172 с.
  104. Katharina Leinius. An Imbalance between Security and Liberty?. – М.: LAP Lambert Academic Publishing, 2012. – 60 с.
  105. Judelyn Salon and Ermelinda Tobias. Dynamics of Society and Development Program Implementation. – М.: LAP Lambert Academic Publishing, 2012. – 180 с.
  106. Muhammad Azfar Anwar and Saif ur Rehman. Defense Spending, National Security and Economic Growth of Pakistan. – М.: LAP Lambert Academic Publishing, 2012. – 128 с.
  107. Anastacia Kariuki. Nutritional Management of Obesity, Diabetes and Hypertension. – М.: LAP Lambert Academic Publishing, 2011. – 64 с.
  108. Ahmed H. Al- habeeb,Ma'an M. Nayif and Mahmoud Y.M. Taha. Effects of Diode Laser & Chlorhixidine on S.mutans in Coronal Cavity. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  109. Vaishnavi Vedam,Karen Boaz and Srikant Natarajan. Autoimmune Oral Lesions. – М.: LAP Lambert Academic Publishing, 2012. – 344 с.
  110. Satish Kumar and Arun Choudhary. Weighted Sub-Additive Information Measures and Their Applications. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  111. Yashwant Singh,Harmendra Kumar Mandia and Laxmi Joshi. Generalized Hypergeometric Function and C- Programming. – М.: LAP Lambert Academic Publishing, 2013. – 212 с.
  112. Mah-e-Bushra Asghar and Rubina Bhatti. Marketing of Library and Information Services and Products. – М.: LAP Lambert Academic Publishing, 2012. – 124 с.
  113. Tahereh Khezrab and Ali Mahbudi. On the Distribution of Information Structures and Focal Points. – М.: LAP Lambert Academic Publishing, 2013. – 324 с.
  114. Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2013. – 204 с.
  115. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  116. Dhanavandan S. and Magizhnan S. Information Sources and Services. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  117. Dimitrios Papadopoulos and Bernhard Hammerli. Positioning the roles, interfaces & processes in the InfoSec scene. – М.: LAP Lambert Academic Publishing, 2014. – 168 с.
  118. Yedji Mbangsoua and Dr. Freddie Acosta. Information Security and its Investment Justification. – М.: LAP Lambert Academic Publishing, 2011. – 132 с.
  119. Yasser Alshehri. Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 156 с.
  120. Levent Bayoglu. Management Information Systems And Data Warehousing. – М.: LAP Lambert Academic Publishing, 2010. – 188 с.
  121. Julien Shabani. Information Security for RFID Systems. – М.: LAP Lambert Academic Publishing, 2011. – 92 с.
  122. Debasish Jena. On Protocols for Information Security Services. – М.: LAP Lambert Academic Publishing, 2011. – 136 с.
  123. Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  124. Mehdi Toloo and Amir Hossein Rahnama. Introduction to Scientific Computing. – М.: Scholars' Press, 2013. – 144 с.
  125. Furhan Mehmood and Rajia Rafique. Information Security in Financial Organizations. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  126. frankie tvrz and marijke coetzee. Information Security of a Bluetooth-enabled handheld device. – М.: LAP Lambert Academic Publishing, 2010. – 180 с.
  127. Ahmed AlNunu. How Much Information Security?. – М.: LAP Lambert Academic Publishing, 2010. – 68 с.
  128. Meysam Namayandeh. Development of Computer Ethical Framework for Information Security. – М.: LAP Lambert Academic Publishing, 2012. – 132 с.
  129. Vinayak Bharadi,Hemchandra Kekre and Rita Vora. Retinal Scan Recognition. – М.: LAP Lambert Academic Publishing, 2012. – 108 с.
  130. NASER EL-BATHY and Ghassan Azar. Intelligent Information Retrieval and Web Mining. – М.: LAP Lambert Academic Publishing, 2010. – 220 с.
  131. Kavitha Ramachandran and Sivadasan E. T. ICEdu : An Information Cloud for Educational Institutions. – М.: LAP Lambert Academic Publishing, 2014. – 72 с.
  132. Ekoningtyas Margu Wardani and Muyanja Ssenyonga. Soaring Food Prices, Food Security, and Poverty in Indonesia. – М.: LAP Lambert Academic Publishing, 2013. – 128 с.
  133. Siddaraju V. G. and Gayathri N. K. Information Technology and Economic Development in India. – М.: LAP Lambert Academic Publishing, 2012. – 116 с.
  134. Zil A. Shah. Analysis of Data Recovery Awareness and Corporate Behavior. – М.: LAP Lambert Academic Publishing, 2012. – 96 с.
  135. Alaa Al-Deen Mohammed Hassan. Information Security Management. – М.: LAP Lambert Academic Publishing, 2013. – 188 с.
  136. Jun Zheng,Jiantao Gu and Hong Wang. Financial Management and Information Security of Independent Colleges. – М.: LAP Lambert Academic Publishing, 2014. – 256 с.
  137. S.Edwin Christopher and N. Rekha Jain. Man Power Planning. – М.: LAP Lambert Academic Publishing, 2011. – 88 с.
  138. Ying Qian. Mitigating Information Security Risks during Operation Transition. – М.: LAP Lambert Academic Publishing, 2012. – 372 с.
  139. G. Sree Rekha and V.K. Agrawal. Common Interface Banking - A New perspective. – М.: LAP Lambert Academic Publishing, 2012. – 80 с.
  140. Kelley Stone. Creating an Information Sharing and Analysis Center. – М.: , 2015. – 144 с.

Лучшие результаты

Ничего не найдено

Дополнительные результаты

  1. Наука человековедения. интервью с Д. Уолтоном, профессором London Metropolitan University, экспертом CIPD. Chartered Institute of Personnel and Development, автором программы Master of Arts in Human Resource Strategies. И. Смирнова, "Кадровый менеджмент", № 5, июль-август 2007.
  2. Специализированный модуль FS-CD. Collections and Disbursements - "Сборы и Выплаты" и его возможности. О.А. Глущенко, "Финансовый менеджмент в страховой компании", № 2, II квартал 2007.
  3. Бюджетирование страховой компании на базе Oracle Enterprise Planning and Budgeting. Д.В. Лесоводский, "Финансовый менеджмент в страховой компании", № 3, III квартал 2006.
  4. BUSINESS PROCESS MANAGEMENT: система для руководителя. А. Крючкова, "Финансовая газета. Региональный выпуск", № 24, июнь 2005.
  5. Тренер должен любить людей. интервью со С. Ивановой, старшим партнером, тренером-консультантом KPG Training Center Ivanova & Lebedeva. "Управление персоналом", № 12, июнь 2005.
  6. Построение системы мотивации по технологии BUSINESS UNIT MANAGEMENT. В. Лунин, "Финансовая газета. Региональный выпуск", № 16, апрель 2005.
  7. Business performance management: источники эффективности. О. Духонина, П. Горянский, "Финансовая газета. Региональный выпуск", № 20, май 2004.
  8. Health management: совершенствуем здоровый образ работы. С. Царенко, "Кадровик.ру", N 5, май 2012 г.
  9. Регулирование операций торгового финансирования: новые инициативы. интервью с Д. Шмандом, вице-председателем Банковской комиссии ICC по supply chain finance, главой подразделения Trade Finance and Cash Management Corporates EMEA в Global Transaction Banking. GTB division Deutsche Bank. Н. Макарова, "Международные банковские операции", N 2, апрель-июнь 2012 г.
  10. Lifestyle management и консьерж-сервис. А.И. Гусев, "Банковский ритейл", N 1, I квартал 2012 г.
  11. Ошибки при формировании и развитии бизнеса private banking & wealth management. А.В. Александров, "Банковский ритейл", N 1, I квартал 2012 г.
  12. О качестве сервиса, связанного с запросами на медицинскую информацию. Medical Information Service?. А. Беденков, "Ремедиум", № 1, январь 2012.
  13. Ужин в темноте в стиле Малевича и Новый год в Хаммере". Что может выть лучше?". интервью с Н. Саниной, индивидуальным предпринимателем и креативным директором компании "San and stars". М. Сипатова, "Арсенал предпринимателя", N 12, декабрь 2011 г.
  14. На пути к новому стандарту в торговом финансировании. интервью с А.  Кастерманом, руководителем Trade and Supply Chain, SWIFT, сопредседателем рабочей группы ICC-BPO. Э. Шакирова, "Международные банковские операции", N 4, октябрь-декабрь 2011 г.
  15. Business Intelligence и Business Performance Management: основные термины и концепции. Ю.В. Амириди, "Управление в кредитной организации", N 5, сентябрь-октябрь 2011 г.
  16. Взаимодействие блока private banking & wealth management с розничным бизнесом. А.В. Александров, "Банковский ритейл", N 3, III квартал 2011 г.
  17. Сегментация клиентов в бизнесе private banking & wealth management. Н.В.  Чумак, "Банковский ритейл", N 1, I квартал 2011 г.
  18. Уильям Савадж: Мотивировать людей в Нижнем Новгороде и Новосибирске нужно по-разному". интервью с У. Саваджем, вице-президентом корпорации Intel, подразделение Software and Services Group. М. Холкина, "Управление персоналом", N 14, июль 2010 г.
  19. Преданность делу - на первом месте. интервью с Д. Левицким, управляющим партнером компании Retail Training Group. "Управление персоналом", N 14, июль 2010 г.
  20. Мотивируйте людей на работу, а не на преданность. интервью с Д.  Кленовым, партнером UFG Wealth Management. "Управление персоналом", N 14, июль 2010 г.
  21. Цены под контролем: the present and the future. С. Стройкова, И. Леметюйнен, "Консультант", № 19, сентябрь 2009.
  22. Business performance management: современный взгляд. Д. Исаев, "Финансовая газета", № 10, 11, март 2009.
  23. Директора заблудились между governance и management. А. Верников, "Банковское обозрение", № 8, август 2008.
  24. Отечественный private banking продолжает эволюционировать в сторону private wealth management. А.И. Гусев, "Инвестиционный банкинг", № 3, III квартал 2008.

Образцы работ

Тема и предметТип и объем работы
Разработка нового товара в маркетинге
Маркетинг
Курсовая работа
40 стр.
Последствия операции НАТО
Политология
Диплом
80 стр.
Слияния и поглощения Мировая и Российская практика
Мировая экономика
Диплом
99 стр.
Привлекательности труда в организации
Психология
Курсовая работа
35 стр.

Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.






Добавить файл

- осталось написать email или телефон

Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Екатерина
Спасибо Вам большое за консультацию. Поставили 5.